How to set up smartphones and PCs. Informational portal
  • home
  • Windows 7, XP
  • Block diagram of the local network. Logical, block diagram of the network

Block diagram of the local network. Logical, block diagram of the network

Based on the scheme of information flows, the separation of these flows, and the scheme of information flows, taking into account the servers, also knowing the location of buildings and their dimensions, we will draw up a structural diagram of the corporate network (IN THE APPENDIX) and give its brief description.

Organization of communication with branches.

In this section, it is necessary to describe the type of communication with the branches issued by the teacher in the following sections: theoretical description of the issued method, equipment that allows you to organize this communication on the receiving and transmitting sides.

Distribution of addresses of workstations taking into account the structural diagram.

In this section, it is necessary to divide the network into several subnets based on the structural diagram of the network. Define IP - addresses for subnets (for servers and PCs), mask and broadcast addresses. Use the out-of-class model for address allocation.

Choice of network protocols.

Select the network protocols that will be used in the developed network and what functions will be performed based on these protocols.

The choice of active and passive equipment of the corporate network.

Types of cables used.

Twisted pair, radio channel and fiber-optic lines are most often used as communication means. When choosing the type of cable, the following indicators are taken into account:

1. Cost of installation and maintenance;

2. Speed ​​of information transfer;

3. Limitations on the distance of information transmission (without additional amplifiers-repeaters (repeaters));

4. Security of data transmission.

The main problem lies in the simultaneous provision of these indicators, for example, the highest data transfer rate is limited by the maximum possible data transmission distance, at which the required level of data protection is still provided. Easy scalability and ease of expansion of the cabling system affect its cost and data transmission security.



Selection of cable types for the network.

To select the type of cable, and hence the type of network technology and, accordingly, the equipment, you need to know what kind of load will be on this communication channel. The length of this channel and the environmental conditions in which this channel will be located.

Let's calculate the load on the communication channels. This requires data from the tables in the first chapter, as well as a block diagram of the network.

Selection of switches.

Switches are:
1. Multi-port device providing high-speed packet switching between ports.
2. In a packet-switched network, a device that directs packets, usually to one of the nodes in the backbone. This device is also called a data switch.

The switch provides each device (server, PC, or hub) connected to one of its ports the entire network bandwidth. This improves performance and decreases network response times by reducing the number of users per segment. Like dual speed hubs, newer switches are often designed to support 10 Mbps or 100 Mbps, depending on the maximum speed of the device being connected. If they are equipped with automatic baud rate detection, they can self-adjust to the optimum baud rate - no manual configuration changes are required. How does the switch work? Unlike hubs that broadcast all packets received on any of the ports, switches transmit packets only to the target device (recipient), since they know the MAC (Media Access Control) address of each connected device (similar to a postman using a mailing address determines where the letter should be delivered). The result is less traffic and higher overall throughput, two critical factors given the increasing demands on network bandwidth in today's complex business applications.

Switching is gaining popularity as a simple, inexpensive method of increasing the available network bandwidth. Modern switches often support features such as traffic prioritization (especially important for voice or video over a network), network management functions, and multicast control.

To select switches, you must first calculate the minimum number of ports for each of them. On each switch, it is necessary to provide spare ports so that in the event of a failure of one of the used ones, you can quickly fix the problem and use one of the spare ports. This approach makes sense for ports for a UTP cable. For optical ports, this is irrelevant, since they rarely fail.

The number of ports is calculated using the following formula:

where: N is the required number of ports; N k is the number of busy ports.

And it is rounded up based on the standard port counts on the switches.

Next, you can proceed to the selection of specific models of switches. We will take, if possible, switches and network cards from one manufacturer. This will avoid conflicts and also simplify network configuration.

Choice of network adapters.

Network Interface Cards (NICs) are installed on desktop and laptop PCs. They are used to interact with other devices on the local network. There is a wide range of network cards for different PCs with specific performance requirements. They are characterized by the speed of data transfer and the methods of connecting to the network.

If we simply consider the method of receiving and transmitting data on PCs connected to the network, then modern network cards (network adapters) play an active role in improving performance, assigning priorities for critical traffic (transmitted / received information) and monitoring traffic on the network. In addition, they support features such as remote activation from a central workstation or remote reconfiguration, which greatly saves the time and effort of administrators in ever-growing networks.

Choice of configuration of servers and workstations.

The main requirement for servers is reliability. To improve reliability, we will choose machines with a RAID controller. It can operate in two modes: "mirror" and "fast mode". We will be interested in the first mode. In this mode, the data written to the hard disk is simultaneously written to another second similar hard disk (duplicated). Also, servers need a larger amount of RAM (how much memory is required to find out is not possible, since we do not know the real sizes of databases and the amount of information stored on hard drives). Also, the server processes the user's requests (database servers), therefore, you need to choose the brand and frequency of the processor better (more) than on workstations.

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Similar documents

    Organization of computer security and information protection from unauthorized access at enterprises. Features of information protection in local area networks. Development of measures and selection of means to ensure information security of the network.

    thesis, added 05/26/2014

    Evolution of computing systems. Basic concepts and basic characteristics of information transmission networks. Tasks, types and topology of local computer networks. Open systems interaction model. Data protection means. IP addressing.

    lecture added on 07/29/2012

    Hardware and software, on the basis of which it is possible to build a local network. Local and global networks. Peer-to-peer and multi-rank networks. Topologies for combining a group of computers into a local network. Used technologies of local networks.

    term paper, added 05/12/2008

    Installation and laying of a local network 10 Base T. General connection diagram. Spheres of application of computer networks. Information transfer protocols. Topologies used in the network. Data transfer methods. Characteristics of the main software.

    term paper added 04/25/2015

    Purpose of local networks as a complex of equipment and software, their technical means, topology. Organization of data transmission in the network. The history of the development of global networks, the emergence of the Internet. The software and technical organization of the Internet.

    abstract, added 06/22/2014

    The role of computer networks, the principles of their construction. Token Ring network building systems. Information transfer protocols used by the topology. Methods of data transmission, means of communication in the network. Software, technology of deployment and installation.

    term paper, added 10/11/2013

    Principles of organizing local networks and their hardware. The main exchange protocols in computer networks and their technologies. Network operating systems. Information security planning, structure and economic calculation of the local network.

    thesis, added 01/07/2010

    The structure of the "Prime Logistics" LLC network and the organization of its protection. Development of a network segment for network backup. Choosing hardware for network backup. The process of implementing a system for preventing data loss in the network.

    thesis, added 10/20/2011

The biggest problem I face when working with enterprise networks is the lack of clear and understandable logical network diagrams. In most cases, I face situations where the customer cannot provide no logic circuits or diagrams. Network diagrams (hereinafter L3-diagrams) are extremely important when solving problems or planning changes in an enterprise network. Logic diagrams are often more valuable than physical wiring diagrams. Sometimes I come across "logical-physical-hybrid" schemes that are practically useless. If you do not know the logical topology of your network, you are blind... Generally, the ability to draw a logical network diagram is not a general skill. It is for this reason that I am writing this article on creating clear and understandable logical network diagrams.

What information should be presented on the L3 diagrams?
In order to create a network diagram, you must have an accurate understanding of how which information must be present and on which exactly schemes. Otherwise, you will mix information and end up with another useless "hybrid" scheme. Good L3 diagrams contain the following information:
  • subnets
    • VLAN ID (all)
    • VLAN names
    • network addresses and masks (prefixes)
  • L3 devices
    • routers, firewalls (hereinafter ITU) and VPN gateways (at least)
    • the most significant servers (for example, DNS, etc.)
    • ip-addresses of these servers
    • logical interfaces
  • routing protocol information
What information should NOT be on L3 diagrams?
The information listed below should not be on the network diagrams, because it belongs to other layers [OSI model, approx. per.] and, accordingly, should be reflected on other schemes:
  • all L2 and L1 information (in general)
  • L2 switches (only management interface can be presented)
  • physical connections between devices
Used notation
Typically, logical circuits use logical symbols. Most of them are self-explanatory. I have already seen the errors of their application, then I will allow myself to stop and give a few examples:
What information is needed to create an L3 schematic?
In order to create a logical network diagram, you need the following information:
  • L2 (or L1) circuit- representation of physical connections between L3 devices and switches
  • L3 device configurations
  • L2 device configurations- text files or access to the GUI, etc.
Example
In this example, we will use a simple network. It will include Cisco switches and ITU Juniper Netscreen. We are provided with an L2 diagram, as well as configuration files for most of the devices presented. The configuration files for the ISP border routers are not provided. in real life, the ISP does not transmit such information. Below is the L2 network topology:

And here are the device configuration files. Only the necessary information is left:

asw1

!
vlan 210
name Servers1
!
vlan 220
name Servers2
!
vlan 230
name Servers3
!
vlan 240
name Servers4
!
vlan 250
name In-mgmt
!
switchport mode trunk
!
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface vlan 250
ip address 192.168.10.11 255.255.255.128
!


asw2

!
vlan 210
name Servers1
!
vlan 220
name Servers2
!
vlan 230
name Servers3
!
vlan 240
name Servers4
!
vlan 250
name In-mgmt
!
interface GigabitEthernet0 / 1
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface GigabitEthernet0 / 2
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface vlan 250
ip address 192.168.10.12 255.255.255.128
!
ip default-gateway 192.168.10.1


asw3

!
vlan 210
name Servers1
!
vlan 220
name Servers2
!
vlan 230
name Servers3
!
vlan 240
name Servers4
!
vlan 250
name In-mgmt
!
interface GigabitEthernet0 / 1
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface GigabitEthernet0 / 2
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface vlan 250
ip address 192.168.10.13 255.255.255.128
!
ip default-gateway 192.168.10.1


csw1

!
vlan 200
name in-transit
!
vlan 210
name Servers1
!
vlan 220
name Servers2
!
vlan 230
name Servers3
!
vlan 240
name Servers4
!
vlan 250
name In-mgmt
!
interface GigabitEthernet0 / 1
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface GigabitEthernet0 / 2
switchport mode trunk
switchport trunk encapsulation dot1q
!
switchport mode trunk
switchport trunk encapsulation dot1q
channel-group 1 mode active
!
switchport mode trunk
switchport trunk encapsulation dot1q
!
switchport mode trunk
switchport trunk encapsulation dot1q
!
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface Port-channel 1
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface vlan 200
ip address 10.0.0.29 255.255.255.240
standby 1 ip 10.0.0.28
!
interface vlan 210
ip address 192.168.0.2 255.255.255.128
standby 2 ip 192.168.0.1
!
interface vlan 220
ip address 192.168.0.130 255.255.255.128
standby 3 ip 192.168.0.129
!
interface vlan 230
ip address 192.168.1.2 255.255.255.128
standby 4 ip 192.168.1.1
!
interface vlan 240
ip address 192.168.1.130 255.255.255.128
standby 5 ip 192.168.1.129
!
interface vlan 250
ip address 192.168.10.2 255.255.255.128
standby 6 ip 192.168.10.1
!


csw2

!
vlan 200
name in-transit
!
vlan 210
name Servers1
!
vlan 220
name Servers2
!
vlan 230
name Servers3
!
vlan 240
name Servers4
!
vlan 250
name In-mgmt
!
interface GigabitEthernet0 / 1
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface GigabitEthernet0 / 2
switchport mode trunk
switchport trunk encapsulation dot1q
channel-group 1 mode active
!
interface GigabitEthernet0 / 3
switchport mode trunk
switchport trunk encapsulation dot1q
channel-group 1 mode active
!
interface GigabitEthernet0 / 4
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface GigabitEthernet0 / 5
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface GigabitEthernet0 / 6
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface Port-channel 1
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface vlan 200
ip address 10.0.0.30 255.255.255.240
standby 1 ip 10.0.0.28
!
interface vlan 210
ip address 192.168.0.3 255.255.255.128
standby 2 ip 192.168.0.1
!
interface vlan 220
ip address 192.168.0.131 255.255.255.128
standby 3 ip 192.168.0.129
!
interface vlan 230
ip address 192.168.1.3 255.255.255.128
standby 4 ip 192.168.1.1
!
interface vlan 240
ip address 192.168.1.131 255.255.255.128
standby 5 ip 192.168.1.129
!
interface vlan 250
ip address 192.168.10.3 255.255.255.128
standby 6 ip 192.168.10.1
!
ip route 0.0.0.0 0.0.0.0 10.0.0.17


fw1




set interface ethernet0 / 1 manage-ip 10.0.0.2

set interface ethernet0 / 2 manage-ip 10.0.0.18


fw2

set interface ethernet0 / 1 zone untrust
set interface ethernet0 / 1.101 tag 101 zone dmz
set interface ethernet0 / 1.102 tag 102 zone mgmt
set interface ethernet0 / 2 zone trust
set interface ethernet0 / 1 ip 10.0.0.1/28
set interface ethernet0 / 1 manage-ip 10.0.0.3
set interface ethernet0 / 1.101 ip 10.0.0.33/28
set interface ethernet0 / 1.102 ip 10.0.0.49/28
set interface ethernet0 / 2 ip 10.0.0.17/28
set interface ethernet0 / 2 manage-ip 10.0.0.19
set vrouter trust-vr route 0.0.0.0/0 interface ethernet0 / 1 gateway 10.0.0.12


outsw1

!
vlan 100
name Outside
!
vlan 101
name DMZ
!
vlan 102
name Mgmt
!
description To-Inet-rtr1
switchport mode access
switchport access vlan 100
!
switchport mode trunk
switchport trunk encapsulation dot1q
!
switchport mode trunk
switchport trunk encapsulation dot1q
channel-group 1 mode active
!
switchport mode trunk
switchport trunk encapsulation dot1q
channel-group 1 mode active
!
interface Port-channel 1
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface vlan 102
ip address 10.0.0.50 255.255.255.240
!


outsw2

!
vlan 100
name Outside
!
vlan 101
name DMZ
!
vlan 102
name Mgmt
!
interface GigabitEthernet1 / 0
description To-Inet-rtr2
switchport mode access
switchport access vlan 100
!
interface GigabitEthernet1 / 1
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface GigabitEthernet1 / 3
switchport mode trunk
switchport trunk encapsulation dot1q
channel-group 1 mode active
!
interface GigabitEthernet1 / 4
switchport mode trunk
switchport trunk encapsulation dot1q
channel-group 1 mode active
!
interface Port-channel 1
switchport mode trunk
switchport trunk encapsulation dot1q
!
interface vlan 102
ip address 10.0.0.51 255.255.255.240
!
ip default-gateway 10.0.0.49

Collection of information and its visualization
Okay. Now that we have all the information we need, we can start rendering.
Display process step by step
  1. Collection of information:
    1. First, let's open the configuration file (in this case ASW1).
    2. Let's take from there each ip-address from the interface sections. In this case, there is only one address ( 192.168.10.11 ) with mask 255.255.255.128 ... Interface name - vlan250, and the name vlan 250 is In-mgmt.
    3. Let's take all static routes from the config. In this case, there is only one (ip default-gateway), and it points to 192.168.10.1 .
  2. Display:
    1. Now, let's display the information we have collected. First, let's draw the device ASW1... ASW1 is a switch, so we use the switch symbol.
    2. Let's draw a subnet (tube). Let's give her a name In-mgmt, VLAN-ID 250 and address 192.168.10.0/25 .
    3. Let's connect ASW1 and the subnet.
    4. Insert a text field between the ASW1 and subnet characters. Let's display the name of the logical interface and the ip-address in it. In this case, the interface name will be vlan250, and the last octet of the ip-address is .11 (it is a common practice to display only the last octet of the ip-address, since the ip-address of the network is already present in the diagram).
    5. There is also another device on the In-mgmt network. Or at least it should be. We do not yet know the name of this device, but its IP address 192.168.10.1 ... We learned this because ASW1 points to this address as the default gateway. So let's map this device to the diagram and give it a temporary name "??". We will also add its address to the diagram - .1 (by the way, I always highlight inaccurate / unknown information in red so that looking at the diagram you can immediately understand what needs to be clarified on it).
At this point, we end up with a circuit similar to this one:

Repeat this process step by step for each network device... Gather all the information related to IP and map in the same diagram: every ip address, every interface and every static route. In the process, your diagram will become very accurate. Make sure the devices that are mentioned but not yet known are shown in the diagram. Just like we did earlier with the address 192.168.10.1 ... Once you have completed all of the above for all known network devices, you can start figuring out the unknown information. You can use MAC and ARP tables for this (wondering if the next post is worth writing about this step in detail?).

Ultimately we will have a schema like this:

Conclusion
Drawing a logical network diagram can be very simple if you have the appropriate knowledge. It is a time consuming manual process, but it is by no means magic. Once you have an L3 network diagram, it is not difficult to keep it up to date. The benefits are well worth the effort:
  • you can plan changes quickly and accurately;
  • solving problems takes much less time than before. Let's imagine that someone needs to solve the problem of unavailability of a service for 192.168.0.200 to 192.168.1.200. After looking at the L3 diagram, it is safe to say that the ITU is not the cause of this problem.
  • You can easily follow the correctness of the ITU rules. I've seen situations where ITUs contained rules for traffic that would never have gone through this ITU. This example shows perfectly well that the logical topology of the network is unknown.
  • Usually, as soon as the L3 network diagram is created, you will immediately notice which parts of the network do not have redundancy, etc. In other words, L3 topology (as well as redundancy) is just as important as physical redundancy.

Today, the most common topology is "star" based on Ethernet technology, which meets all modern requirements for a local area network and is quite easy to use. From the diagram of a structured cabling system in Fig. 10, it is clear that a given topology is best suited for a given organization.

Rice. 9. Star topology

Advantages:

· Failure of one workstation does not affect the operation of the entire network as a whole;

· Good scalability of the network;

· Easy search for faults and breaks in the network;

· High network performance (subject to correct design);

· Flexible administration options.

Flaws:

· Failure of the central hub will result in the inoperability of the network (or network segment) as a whole;

· For laying a network, more cable is often required than for most other topologies;

· The finite number of workstations in the network (or network segment) is limited by the number of ports in the central hub.

At the center of each "star" is a hub or switch that is directly connected to each individual node on the network through a thin flexible UTP cable, also called a "twisted pair" cable. The cable connects the network adapter to the PC on one side, and to a hub or switch on the other. Installing a star network is simple and inexpensive. The number of nodes that can be connected to a hub is determined by the possible number of ports on the hub itself. However, there is a limit on the number of nodes: a network can have a maximum of 1024 nodes. A star workgroup can function independently or be linked to other workgroups.

Fast Ethernet was chosen as the access technology, providing a data exchange rate of 100 Mbit / s.

As a subtype of this technology, 100BASE-TX was chosen, IEEE 802.3u - the development of the 10BASE-T standard for use in star networks. Twisted pair of category 5 is used: CAT5e - data transfer rate up to 100 Mbit / s when using 2 pairs. Category 5e cable is the most common and is used to build computer networks. The advantages of this cable are lower cost and lower thickness.

Formation of the address structure of the network:

To form the address space of this network, class C IP addresses were selected (addresses from the range from 192.0.0.0 to 223.255.255.0). The subnet mask is 255.255.255.0. The first 3 bytes form the network number, the last byte form the node number.

Rice. 10. Diagram of a structured cabling system

Logical networking


There are a number of IP addresses that are reserved for use on local networks only. Packets with such addresses are not forwarded by routers on the Internet. In class C, such IP addresses include addresses from 192.168.0.0 to 192.168.255.0.

Therefore, for the local network of the school, we assign the following IP addresses:

Server - 192.168.1.1;

· Computer in the assembly hall - 192.168.1.2;

Secretary's computer - 192.168.1.3

· Network printer in the secretary's office - 192.168.1.4;

The contact network (CS) is a complex engineering structure with a considerable length and periodic structure, designed for continuous power supply of rolling stock through a sliding contact.

The analysis of downtime of the tram rolling stock (SS) on the line in a number of large cities shows that a rather frequent reason for downtime on the line is the failure of the contact network. Thus, according to the Novosibirsk Department of Transport, up to 7.5% of the SS downtime in temporary terms occurred on the line due to the CS failure. In this regard, the assessment of the technical condition of the compressor station from the standpoint of reliability is one of the most important tasks.

When analyzing the failures of the compressor station in Novosibirsk, failures resulting from extraneous interactions, such as breakage of suspensions by oversized cargo, damage to supporting structures by vehicles, wire annealing as a result of accidents at the substation, damage to suspensions by faulty current collectors, were identified and excluded. In the course of a preliminary analysis of the statistical material, it was revealed that the main part (79.8% of the total number of failures) is made up of such failures: a break in a contact wire, a wire breaking from a clamp, a break in a flexible cross member, and damage to intersections.

An analysis of statistical material and data from operating services shows that the overhead catenary is not an equally reliable system, which indicates the need for further improvement of the structures and assemblies of the tram overhead catenary, in particular intersections. The greatest number of failures occurs at the moment the pantograph passes through the special parts and the points of suspension and fixation of the contact wire, i.e., as a result of unsatisfactory interaction due to improper adjustment and installation of the suspension, as well as pantograph malfunctions.

It should be noted that up to 27.3% of all failures of tram pantographs on the line arise as a result of cuts and increased wear of contact inserts, which, as is known, is largely caused by a violation of the parameters of the overhead catenary, such as: the magnitude of the zigzags, the height of the overhead wire above the level rail heads, slopes and rises of the contact wire, arson.

In addition, from the graphs shown in Fig. 4.10, there is a clear dependence of the amount of damage on climatic conditions. Thus, the maximum rate of failures of the “flexible crossbar break” type falls on May and September with the largest daily temperature difference, and for failures of the “CP breakage and CP breakout” type from the clamp, the maximum rate falls on June, which is characterized by the highest temperatures.

Rice. 4.10.

Since the CS is a complex electrical object, its reliability as a whole is determined by the reliability of its constituent elements. Therefore, when analyzing the reliability of a compressor station, it is necessary:

  • to determine the influence of the type of suspension and the quality of its maintenance on the reliability of the compressor station;
  • to identify elements that have a reduced reliability in comparison with others;
  • determine climatic factors affecting the reliability of the elements.

The main requirement for the compressor station as an element of the maintenance and repair system is the constant compliance of the main parameters with the required level of reliability, operating conditions and intensity of use. Such compliance can be achieved if the actual parameters of the compressor station reliability, as well as the parameters of the maintenance and repair system, are formed on the basis of objective information about the technical condition of the compressor station.

The technical condition of the compressor station can be determined by the results of measuring and evaluating a large number of input, internal and output parameters. In practice, in order to determine the technical state, it is enough to single out a set of direct and indirect diagnostic signs and parameters that reflect the most probable malfunctions associated with a decrease in performance and the occurrence of failures.

The block-functional decomposition of the CS is shown in Fig. 4.11. Vertical decomposition leads to the construction of a hierarchy of links between its constituent components. In this hierarchy, four levels are distinguished: sectional, which includes a section of the contact network; system, including supporting, carrying, fixing, linear current carrying, supporting devices, devices for compensating for thermal expansion, interfaces and special parts; the subsystem level includes individual assembly units; the fourth level - elemental - includes non-separable parts. This decomposition predetermines the form of subordination of diagnostic goals and algorithms. The horizontal decomposition of the CS makes it possible to single out individual components according to the basic principle of the physical process, functional purpose, or the principle of technical performance.

Rice. 4.11.

As an example of the relationship between the elements of the COP in Fig. 4.12 shows the schemes for a simple (a) and chain (b) pendants.

When diagnosing each of these systems, among several used physical diagnostic methods, one can single out the dominant one, which makes it possible to determine the technical state of the compressor station with a sufficient degree of reliability.

During operation, the compressor station can be in the following basic states:

It is serviceable and efficient, which means that the parameters Z, which characterize the state of its elements and assemblies, are within the nominal tolerance range:


Rice. 4.12.

Defective, but efficient, which is due to the output of the parameters of the main elements and nodes from the tolerance range, but not higher than the limit values:

Defective and inoperative, therefore, the parameters of the main elements and nodes are out of tolerance:

The limits of the specified tolerances for the existing types of overhead catenaries are given in the regulatory documents. However, it should be noted that the existing tolerances mainly reflect the state of the suspension through its geometric dimensions in a static state, i.e. in the absence of rolling stock. In the mode of normal functioning, the CS throughout its entire length is in interaction with the PS pantographs, and therefore, it should also be evaluated according to indicators characterizing the interaction, taking into account reliability, durability and quality, i.e., the stability of the contact.

The specified level of the compressor station operational reliability is supported by the implementation of the system of repairs and adjustments determined by the normative and technical documentation. The existing system of maintenance and repair, aimed at maintaining the efficiency of the compressor station, includes monitoring the most important parameters of the overhead catenary and adjusting them. However, control measurements show that the technical equipment of individual operations is insufficient and ineffective. In addition, it is envisaged to control the parameters of the CC in a static state, which, given the existing connections, makes it even more difficult to objectively assess its state. Consequently, it is possible to obtain complete and reliable information only through complex diagnostics of all parameters of the CS along its entire length in the operating mode.

Top related articles